Acceptation Deception Detection In Google Play Applications

Authors

  • Dhivya Prabha E  Assistant Professor Department of Computer Science and Engineering Sri Krishna College of Technology,Kovai Pudur, Coimbatore, Tamil Nadu, India
  • Gowsalya R  Student Department of Computer Science and Engineering Sri Krishna College of Technology,Kovai Pudur, Coimbatore, Tamil Nadu, India
  • Gowsalya S  Student Department of Computer Science and Engineering Sri Krishna College of Technology,Kovai Pudur, Coimbatore, Tamil Nadu, India

Keywords:

Classification , Fraudeagle, GroupsTrainer.

Abstract

Dishonorable behaviors in google Play, the foremost fashionable automaton app market, fuel search rank abuse and malware proliferation. To identify malware, previous work has targeted on app possible and permission analysis. Through out this project, we tend to introduce a very distinctive malware detection framework that discovers and leverages traces left behind by fraudsters, to find every malware and apps subjected to travel trying rank fraud. The fraud app is detected by aggregating the three evidences like ranking primarily based, co review principally based on rating based proof. Thus by aggregating entire activities of leading apps, it will do over ninety fifth accuracy in classifying gold customary datasets of malware, dishonorable and legit apps. To boot we tend to use progressive learning approach to characterize the large amount of knowledge sets. It effectively integrates all the evidences for fraud detection. To accurately realize the ranking fraud, there is a necessity to mining the active period’s significantly leading sessions, of mobile Apps. Such leading sessions is leveraged for detection the native anomaly instead of international anomaly of app rankings.

References

  1. Mahmudur Rahman,"Search Rank Fruad and Malware Detection in Google Play",IEEE dealings on data and information Engineering,VOL.29 NO.6,June 2017.
  2. E.Siegel, "Fake reviews in Google Play and Apple App Store," App entive, Seattle, WA, USA, 2014.
  3. E. E. Papalexakis, T. Dumitras, D. H. P. Chau, B. A. Prakash, and C. Faloutsos. Spatio-temporal mining of code adoption in proceedings of the IEEE/ACM International Conference on "Advances in Social Network Analysis and Mining", 2013.
  4. Bleeping laptop. Cryptolocker ransomware info guide and liGregorian calendar month 2013.
  5. Intrusions and Malware and Vulnerability", 2012.
  6. W. Zhuang, E. Tas, U. Gupta, and M. Abdulhayoglu. Cloud primarily based malware detection in Proceedings of the ACM International Conference on "Knowledge Discovery and information Mining", 2011.
  7. T. Dumitras and D. Shou. Proceedings of the European Conference on "Data Mining and its knowledge", 2011.
  8. Symantec web security threat report. 18,2011.
  9. M.Grace,Y.Zhou,"Risk Ranker :Scalable and detection" in Proc.ACM MOBISYS,2011.

Downloads

Published

2018-04-30

Issue

Section

Research Articles

How to Cite

[1]
Dhivya Prabha E, Gowsalya R, Gowsalya S, " Acceptation Deception Detection In Google Play Applications, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 3, pp.523-532, March-April-2018.